Claim Missing Document
Check
Articles

Found 31 Documents
Search

PEMBANGUNAN PEMANTAU KINERJA JARINGAN KOMPUTER MELALUI REMASTERING UBUNTU Pebriananta, Andi; Widiasari, Indrastanti R.; Bayu, T. Indra
JUTI: Jurnal Ilmiah Teknologi Informasi Vol 9, No 1, Januari 2011
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (338.205 KB) | DOI: 10.12962/j24068535.v9i1.a66

Abstract

Pada saat ini Distribusi Linux yang berkembang sangat beraneka macam, tetapi yang cocok untuk memenuhi kebutuhan pemantau kinerja jaringan komputer masih sedikit. Paper ini berfokus pada pembangunan Distribusi Linux yang memiliki aplikasi standar khusus untuk pemantauan kinerja jaringan komputer. Distribusi Linux yang dibangun diturunkan dari Distribusi Linux Ubuntu Karmic Koala dengan teknik remastering. Sulolinuz adalah hasil Distribusi Linux baru ini, dengan perancangan aplikasi khusus pemantau kinerja jaringan yang digunakan kinerja Sulolinuz lebih efisien dari Ubuntu Karmic Koala. Sulolinuz memiliki performa yang lebih cepat dalam hal time respon pada saat melakukan booting dan shutdown. Sulolinuz lebih unggul dalam penggunaan RAM dan CPU saat melakukan proses pemantauan kinerja jaringan maupun saat berada dalam posisi idle.
ANALISIS PERFORMA CONTAINER BERPLATFORM DOCKER ATAS SERANGANMALICIOUS SOFTWARE (MALWARE) Cahyaningrum, Yuliana; Widiasari, Indrastanti Ratna
Jurnal Buana Informatika Vol 11, No 1 (2020): Jurnal Buana Informatika Volume 11 - Nomor 1 - April 2020
Publisher : Universitas Atma Jaya Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (376.974 KB) | DOI: 10.24002/jbi.v11i1.3279

Abstract

Abstract. As a new virtualization technology, many things about container technology need to be explored . One of them is data security issue when this technology is applied in a network. The study aims to discover a container performance when a server is being attacked by a malware. In this research, the container is installed natively on Windows Server 2016 and using Docker as the platform. Two groups of malware are used that each group has different effect on the server system. The results show that the malware used in this research does not affect the container performance yet it affects the network used by the container. The calculation results point out an increasing delay at HTTP protocol when the server is being attacked by malware group A which is from 0.028335 ms to 2.2698161 ms. The attack of group B malware on the server caused the website inside the container inaccessible. This is because group B malware also attacked the network server where the container is holding to.Keywords : Virtualization, Container, Malware, Native, Windows Server 2016, Docker.Abstrak. Sebagai teknologi virtualisasi yang baru, banyak hal yang perlu digali tentang teknologi container. Salah satunya adalah masalah keamanan data jika teknologi ini diterapkan dalam jaringan. Penelitian bertujuan untuk mengetahui performa container bila server mendapat serangan dari malware. Pada penelitian ini container dipasang secara native pada Windows Server 2016 dan menggunakan Docker sebagai platform. Dua kelompok malware digunakan dalam penelitian ini dimana setiap kelompok memiliki efek yang berbeda pada sistem server. Hasil menunjukkan bahwa malware yang digunakan dalam penelitian ini tidak mempengaruhi kinerja container, tetapi mempengaruhi network yang digunakan oleh container. Hasil penghitungan menunjukkan kenaikan delay pada protokol HTTP pada saat server mengalami serangan malware kelompok A yaitu dari 0.028335 ms sampai 2.2698161 ms. Serangan malware kelompok B pada server menyebabkan website yang ada di dalam container tersebut tidak dapat diakses. Hal ini disebabkan malware kelompok B juga menyerang network server dimana container tersebut menginduk.Kata Kunci : Virtualisasi, Container, Malware, Native, Windows Server 2016, Docker.
PERANCANGAN DAN ANALISIS EXTERNAL WIRELESS ROAMING PADA JARINGAN HOTSPOT MENGGUNAKAN DUA JARINGAN MOBILE BROADBAND Fra Arsandy Kusuma Sejati; Indrastanti Ratna Widiasari; Theophilus Wellem
Semantik Vol 2, No 1 (2012): Prosiding Semantik 2012
Publisher : Semantik

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (486.548 KB)

Abstract

External wireless roaming adalah salah satu cara untuk meningkatkan reliabilitas dari suatu jaringan hotspot yang masih menggunakan topologi Basic Service Set (BSS). Ketika user berjalan menjauhi salah satu access point (AP) atau salah satu AP mati kemudian mulai kehilangan sinyal, mobile station (MS) secara otomatis terkoneksi dengan AP yang lain tanpa harus melakukan konfigurasi ulang. Perangkat yang mendukung external wireless roaming adalah AP TP-Link TLWR740N dengan menggunakan firmware DD-WRT yang mendukung DHCP forwarder. External wireless roaming memberikan kemudahan bagi para user jika terdapat lebih dari satu AP dalam suatu area.Kata Kunci : External wireless roaming, DD-WRT, DHCP forwarder
Penerapan Knowledge Sistem Informasi Penjaminan Mutu Fakultas Berbasis Web Di FTI-UKSW William Christopher; Indrastanti Ratna Widiasari
Journal of Information System and Informatics Vol 3 No 1 (2021): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33557/journalisi.v3i1.86

Abstract

Information technology is one of the assets of a company or organization that is important for its development, with the rapid development of technology today, technology must always be updated. One of the roles of information technology is the application of knowledge management. Knowledge Management is a system that is able to improve and manage knowledge information in companies or agencies that apply knowledge management. In this study, it focuses on implementing a knowledge management system in the Quality Assurance of the Faculties at Satya Wacana Christian University. This research is based on the fact that PMF institutions still use manual methods in data archiving, the purpose of this study is to design a web application that is useful for archiving PMF data to make it more effective and efficient. In this study, the KMS (Knowledge Management System) is applied, and uses the Knowledge Management System Life Cycle method which consists of several process stages consisting of infrastructure evaluation, KMS design analysis and development, and evaluation at the final stage. The result of this research is a useful data archiving web application for PMF. It is hoped that PMF will be more efficient in data archiving.
Perancangan Sistem Kontrol Kekeruhan Air Berbasis Website Internet of Things Nikolaus Toni; Indrastanti R. Widiasari
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 3 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v8i3.1102

Abstract

Pada musim penghujan, warga Angan Limau tidak pernah mendapatkan air bersih, karena air langsung masuk ke dalam tandon air. Jika hal ini terjadi terus-menerus, warga sekitar akan mudah terkena penyakit akibat mengkosumsi air yang tidak layak dikonsumsi. Maka dari itu, diperlukan alat yang dapat membantu warga sekitar untuk mengontrol kekeruhan air pada tandon air warga tersebut. Penelitian ini menggunakan metode perancangan sistem kendali kekeruhan air pada penampungan air warga Angan Limau berdasarkan website Internet of Things (IoT). Hasil penelitian didapatkan bahwa sistem kontrol kekeruhan air pada air tandon berbasis website dapat membantu mengontrol kualitas serta tingkat kekeruhan air. Dari pengujian yang dilakukan, komponen sensor kekeruhan berjalan dengan baik dan komponen solenoid valve bekerja sesuai dengan kontrol yang diberikan.
Perancangan dan Penerapan Kendali Lampu Ruangan Berbasis IoT (Internet of Things) Android Wisnu Widi Anggoro; Indrastanti R Widiasari
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 3 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v8i3.1311

Abstract

Internet of Things (IoT) is a concept that aims to expand the benefits of internet connectivity continuously . Along with the development of the era, the Internet of Things is widely used for various fields with the intention to helping human’s life, one of them is an electronic device for room lights that can be controlled remotely by utilizing an internet connection and controlled via an android smartphone. This research was conducted with the aim of building a smart home control prototype using the NodeMCU ESP8266 module as a microcontroller and system controller by using a bot on the Telegram, an android application. Based on the results of the experiments that has been done, it can be concluded that the system can work well according to it purpose.
Analisis Routing Protokol Optimized Link State Routing (OLSR) Pada Raspberry Pi Ulfa Septilia Permatasari; Indrastanti Ratna Widiasari
AITI Vol 16 No 2 (2019)
Publisher : Fakultas Teknologi Informasi Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (543.866 KB) | DOI: 10.24246/aiti.v16i2.151-164

Abstract

Optimized Link State Routing (OLSR)is one of the two standard for mesh networks. OLSR is a link state routing protocol, which use hallo message and topology control (TC) to determine the link state information across the mobile ad-hoc network. OLSR is widely used in the wireless mesh network. Raspberry Pi is a mini computer which can be used as a node router to replace the function of a router in a wireless mesh network. In this research, Raspberry Pi is used as a router nodes to determine the performance of routing protocol OLSR. The parameters used to measure its performance is self-configure time, self-healing and bandwidth usage. The test results showed that the use of routing protocols OLSR on the Raspberry Pi in a wireless mesh network proved able to repair itself if there is a problem on the network since it has ability to self-configure and self-healing.
Analisis Sentimen Pada Rating Aplikasi Shopee Menggunakan Metode Decision Tree Berbasis SMOTE Christian Cahyaningtyas; Yessica Nataliani; Indrastanti Ratna Widiasari
AITI Vol 18 No 2 (2021)
Publisher : Fakultas Teknologi Informasi Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/aiti.v18i2.173-184

Abstract

Analisis sentimen adalah cabang penelitian text mining yang melakukan proses dalam klasifikasi pada dokumen teks. Analisis sentimen merupakan mengekstrasi pendapat, emosi dan evaluasi seseorang yang tertulis mengenai suatu topik tertentu dengan memanfaatkan teknik pemrosesan bahasa alami. Peneliti melakukan penelitian tentang analisis sentimen pada rating aplikasi Shopee dengan menggunakan metode Decision Tree. Tujuan penelitian ini untuk mengetahui tingkat keakurasian dan mengetahui pendapat pengguna mengenai aplikasi Shopee ini. Hasil penelitian dengan menggunakan algoritma Decision Tree dengan SMOTE (Synthetic Minority Oversampling Technique) nilai accuracy-nya menghasilkan 99,91 persen, AUC (Area Under Curve) 0,999, recall 99,88 persen dan nilai precision 99,98 persen. Hasil menggunakan algoritma Decision Tree tanpa SMOTE nilai accuracynya menghasilkan 99,89 persen, AUC (Area Under Curve) 0,950, recall 99,88 persen dan nilai precision 99,98 persen. Dari hasil evaluasi yang ada dapat ditarik kesimpulan SMOTE dapat berpengaruh terhadap nilai accuracy dan AUC (Area Under Curve), serta untuk nilai recall dan precision tidak berpengaruh atau hasilnya tetap sama walau menggunakan SMOTE atau tanpa SMOTE. Selisih nilai accuracy yang didapat adalah 0,02 persen dan untuk AUC-nya sebesar 0.049.
Analisis Keamanan Komunikasi VoIP Server Portable Dilengkapi OpenVPN Menggunakan Linux Asterisk Rapawuli Eko Putro; Indrastanti Ratna Widiasari
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 2 (2022): April 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i2.3884

Abstract

Communication is a very important thing, VoIP is one of the supports that is often used to facilitate communication. VoIP is connected to the internet network so that communication can occur, but VoIP is very vulnerable to security problems in communication. It is very easy for eavesdropping to occur by parties who want to know ongoing information for certain purposes, therefore VoIP security must exist, openVPN is one that is often used. With services that are private / private so that the communication network is protected. In this security research, testing is carried out on a VoIP network with a linux asterisk server using a VPN and not using a VPN. With different results on tests of delay, packet loss, jitter. In the test made a phone call that was registered on the voip server so that the call could be made. The call test was carried out several times and for 6 days in order to see if the results produced were as expected because the internet network could also be disrupted by weather condition. The first phone call that was made without using a VPN the results that were obtained were not very good, in contrast to the second phone call that used a VPN the results produced by the analysis were better.
Implementasi Proxy dan Snort Sebagai Gateway Antivirus Andreas Sebayang; Indrastanti Ratna Widiasari
MEANS (Media Informasi Analisa dan Sistem) Volume 6 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (781.27 KB) | DOI: 10.54367/means.v6i1.1232

Abstract

Technology and internet networks are two things that are always related, because in today's era the internet has become a much-needed medium for learning, communicating, exchanging data, and even playing. With the activity of using the internet network, a problem will arise, namely network security. Network security is a very important aspect as a defense in a network, to minimize the risk of data theft and unwanted access in an internet network. The purpose of this study is to implement the control and security of internet use in an agency with minimal costs. namely using the Linux operating system Ubuntu Server 18.04, Proxy Server, and Snort. The result of the system that has been created has a function to perform caching so that it can save bandwidth and can function as filtering content to minimize unwanted things on the network. In addition, the system created is very helpful for network admins to monitor the network in real-time, even can also enforce rules to protect the network.